Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

News

December 16, 2020

Lookout Exposes New Spyware Used By Sextortionists To Blackmail iOS And Android Users

Android Devices Run Outdated Operating Systems
Read News
November 11, 2020

Fraudulent Minecraft-Related Apps Deceive Millions Of Google Play Users, Avast Warns

Fraudulent Minecraft-Related Apps Deceive Millions Of Google Play Users, Avast Warns
Read News
August 25, 2020

RESEARCH REVEALS INSTITUTIONAL INVESTORS ARE OPTIMISTIC ABOUT A FUTURE RISE IN THE VALUE OF BITCOIN

DDoS for Bitcoin attack
Read News
August 7, 2020

LogMeIn Introduces New LastPass Security Dashboard and Dark Web Monitoring, Delivering a Complete Command Center for Managing Digital Security

World’s 10 Hottest Cybersecurity Companies to Watch in 2016
Read News
July 21, 2020

API Security and API Sentinel

API Security and API Sentinel
Read News
July 15, 2020

ESET Discovers A Chat App Spying On Users And Leaking Stolen Data

Encryption expert NJ hospital patient data breach
Read News
July 3, 2020

F5 Fixes Critical Vulnerability Discovered by Positive Technologies in BIG-IP Application Delivery Controller

F5 Fixes Critical Vulnerability Discovered by Positive Technologies in BIG-IP Application Delivery Controller
Read News
June 29, 2020

Targeted Attacks On Industrial Companies Using Snake Ransomware

Targeted Attacks On Industrial Companies Using Snake Ransomware
Read News
June 26, 2020

200M+ Users At Risk: New Malicious .slk Files Are Bypassing Microsoft 365 Security

200M+ Users At Risk: New Malicious .slk Files Are Bypassing Microsoft 365 Security
Read News
June 26, 2020

New Cryptominer Malware is Attacking Windows and Linux Machines

New Cryptominer Malware is Attacking Windows and Linux Machines
Read News
June 25, 2020

ESET Researchers Discover New Android Ransomware, Provide A Decryptor

ESET Researchers Discover New Android Ransomware, Provide A Decryptor
Read News
June 24, 2020

Avast Reports HiddenAds Adware Campaign In 47 Apps Disguised As Games On The Google Play Store

Anti-Bouncer technique
Read News
June 24, 2020

Cloud Security Alliance Announces Availability Of Key Cloud Security Assessment And Guidance Documents In 10 Additional Languages

Cloud Security Alliance Announces Availability Of Key Cloud Security Assessment And Guidance Documents In 10 Additional Languages
Read News
June 24, 2020

ESET Researchers Discover New Android Ransomware, Provide a Decryptor

ESET Researchers Discover New Android Ransomware, Provide a Decryptor
Read News
June 15, 2020

HackerOne brings hacker-powered pentesting to European organisations

HackerOne brings hacker-powered pentesting to European organisations
Read News
June 9, 2020

CREST Report Highlights Actions to Improve Gender Diversity in the Cyber Security Industry

CREST Report Highlights Actions to Improve Gender Diversity in the Cyber Security Industry
Read News
June 4, 2020

Fraudulent iOS VPN Apps Attempt To Scam Users

Third Platform will Push CIOs to Go Smart
Read News
June 2, 2020

Past, Present And Future Of Cybercrime

cybercrime
Read News
May 27, 2020

Cyber-espionage Group Turla (a.k.a. Snake) Now Uses Gmail Web Interface For Command And Control, ESET Discovers

Cyber-espionage Group Turla (a.k.a. Snake) Now Uses Gmail Web Interface For Command And Control, ESET Discovers
Read News
March 26, 2020

DDoS Attacks Increase 180% In 2019 Compared To 2018

DDoS Attacks Increase 180% In 2019 Compared To 2018
Read News
March 17, 2020

How Mature Is Your Threat Intelligence?

How Mature Is Your Threat Intelligence?
Read News
February 4, 2020

(ISC)2 Security Congress 2020 Opens Call For Speakers

(ISC)2 Security Congress 2020 Opens Call For Speakers
Read News
January 8, 2020

Check Point Research Reveals Multiple Vulnerabilities In TikTok

Threatarmor to Strengthen Enterprise
Read News
December 20, 2019

F5 To Acquire Shape Security, Transforming Application Security

F5 To Acquire Shape Security, Transforming Application Security
Read News
December 18, 2019

Kaspersky Newsflash: Start Of Season 2 For Series “You” – Cybersecurity Expert Warns Against Underestimating Stalkerware Programs

Kaspersky Newsflash: Start Of Season 2 For Series “You” – Cybersecurity Expert Warns Against Underestimating Stalkerware Programs
Read News
December 12, 2019

IBM AI Innovations Sharpen Risk Detection In Identity Management

IBM AI Innovations Sharpen Risk Detection In Identity Management
Read News
  • 1
  • 2
  • 3
  • …
  • 114
  • ›
Loading...

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel